Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: JN Tecnologia Ltda-ME

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
firewall-block, port(s): 23/tcp
2019-06-23 10:02:17
Comments on same subnet:
IP Type Details Datetime
138.185.166.218 attack
spam
2020-04-15 16:02:51
138.185.166.133 attackspam
email spam
2020-03-01 19:46:06
138.185.166.254 attack
Sending SPAM email
2020-02-06 23:44:58
138.185.166.173 attackbotsspam
spam
2020-01-22 16:23:34
138.185.162.212 attackspam
Unauthorized connection attempt detected from IP address 138.185.162.212 to port 23 [J]
2020-01-18 16:28:54
138.185.161.49 attackbotsspam
1578401817 - 01/07/2020 13:56:57 Host: 138.185.161.49/138.185.161.49 Port: 445 TCP Blocked
2020-01-08 03:13:36
138.185.166.136 attackbots
Absender hat Spam-Falle ausgel?st
2019-12-19 16:15:01
138.185.161.51 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-12-01 00:44:34
138.185.161.49 attackspambots
Unauthorized connection attempt from IP address 138.185.161.49 on Port 445(SMB)
2019-11-01 04:50:22
138.185.161.51 attackbotsspam
Port 1433 Scan
2019-10-18 22:09:27
138.185.161.49 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 17:00:51,614 INFO [amun_request_handler] PortScan Detected on Port: 445 (138.185.161.49)
2019-09-12 11:39:42
138.185.166.194 attackspam
Brute force attempt
2019-08-15 05:13:26
138.185.166.166 attackspambots
Lines containing failures of 138.185.166.166
Jul 27 03:25:46 omfg postfix/smtpd[27121]: connect from unknown[138.185.166.166]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.185.166.166
2019-07-29 08:50:12
138.185.166.149 attackspam
Jul 17 15:34:24 h2421860 postfix/postscreen[29334]: CONNECT from [138.185.166.149]:57743 to [85.214.119.52]:25
Jul 17 15:34:24 h2421860 postfix/dnsblog[29337]: addr 138.185.166.149 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain bl.spamcop.net as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 17 15:34:24 h2421860 postfix/dnsblog[29342]: addr 138.185.166.149 listed by domain Unknown.trblspam.com as 185.53.179.7
Jul 17 15:34:24 h2421860 postfix/dnsblog[29339]: addr 138.185.166.149 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain dnsbl.sorbs.net as 127.0.0.6
Jul 17 15:34:24 h2421860 postfix/postscre........
-------------------------------
2019-07-18 18:23:59
138.185.166.194 attack
Jul 10 20:09:44 mxgate1 postfix/postscreen[26117]: CONNECT from [138.185.166.194]:49880 to [176.31.12.44]:25
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26122]: addr 138.185.166.194 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26119]: addr 138.185.166.194 listed by domain bl.spamcop.net as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26121]: addr 138.185.166.194 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/dnsblog[26166]: addr 138.185.166.194 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/postscreen[26117]: PREGREET 38 after 0.53 from [138.185.166.194]:49880: EHLO ip138-185-166-194.netjat.com.br

Jul 10 20:09:45 mxgate1 postfix........
-------------------------------
2019-07-11 18:27:41
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.185.16.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10216
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.185.16.2.			IN	A

;; AUTHORITY SECTION:
.			3032	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062202 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 23 10:02:07 CST 2019
;; MSG SIZE  rcvd: 116
Host info
2.16.185.138.in-addr.arpa domain name pointer ip-138.185.16.2.custodiaonline.com.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
2.16.185.138.in-addr.arpa	name = ip-138.185.16.2.custodiaonline.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.103.141 attackspam
SSH_attack
2020-09-12 20:34:08
122.51.60.34 attackspam
Sep 11 18:58:38 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=122.51.60.34 DST=173.212.244.83 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=46082 DF PROTO=TCP SPT=52080 DPT=8080 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 11 18:58:39 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=122.51.60.34 DST=173.212.244.83 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=42680 DF PROTO=TCP SPT=46246 DPT=1433 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 11 18:58:40 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=122.51.60.34 DST=173.212.244.83 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=26658 DF PROTO=TCP SPT=33560 DPT=6379 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 11 18:58:41 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=122.51.60.34 DST=173.212.244.83 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=30603 DF PROTO=TCP SPT=47802 DPT=7001 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 11 18:58
...
2020-09-12 20:54:22
177.159.99.89 attack
Unauthorized connection attempt from IP address 177.159.99.89 on port 993
2020-09-12 20:50:46
51.38.118.26 attackbots
Sep 12 08:38:03 scw-focused-cartwright sshd[2051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.118.26
Sep 12 08:38:05 scw-focused-cartwright sshd[2051]: Failed password for invalid user admin from 51.38.118.26 port 42428 ssh2
2020-09-12 20:36:12
182.156.72.222 attackspambots
Icarus honeypot on github
2020-09-12 20:27:25
62.33.211.129 attackbotsspam
Distributed brute force attack
2020-09-12 20:49:53
112.78.11.31 attackbotsspam
Sep 12 10:08:34 root sshd[27304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.11.31 
...
2020-09-12 20:52:12
177.69.237.54 attack
Invalid user hfbx from 177.69.237.54 port 49958
2020-09-12 20:55:03
185.39.11.32 attack
scans 9 times in preceeding hours on the ports (in chronological order) 3447 3377 3430 3472 3367 3446 3478 3371 3445 resulting in total of 13 scans from 185.39.8.0/22 block.
2020-09-12 20:26:05
111.229.237.58 attackbots
Sep 12 11:09:02 django-0 sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.237.58  user=root
Sep 12 11:09:04 django-0 sshd[10922]: Failed password for root from 111.229.237.58 port 53104 ssh2
...
2020-09-12 20:30:00
185.175.93.8 attack
Unauthorized connection attempt from IP address 185.175.93.8 on port 3389
2020-09-12 20:51:13
86.188.246.2 attackbots
Invalid user electoral from 86.188.246.2 port 32783
2020-09-12 20:55:41
116.6.84.34 attack
Sep 12 10:52:06 root sshd[32329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.84.34 
Sep 12 10:52:08 root sshd[32329]: Failed password for invalid user admin from 116.6.84.34 port 19799 ssh2
...
2020-09-12 20:53:16
94.187.32.35 attack
Amazon.job's - Recruitment
2020-09-12 20:16:18
27.223.89.238 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-12T12:26:15Z and 2020-09-12T12:29:15Z
2020-09-12 20:50:15

Recently Reported IPs

180.167.155.237 168.232.130.147 80.211.228.111 237.202.168.95
221.227.42.42 9.93.128.79 15.161.149.39 116.217.193.7
138.87.230.88 186.213.143.185 251.158.21.67 229.148.147.118
245.80.92.245 65.27.99.241 122.43.8.8 72.45.82.232
46.242.119.214 45.163.159.160 187.64.36.130 34.201.111.214